[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/792770.793693guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Privacy-enhancing technologies for the Internet

Published: 23 February 1997 Publication History

Abstract

The increased use of the Internet for everyday activities is bringing new threats to personal privacy. The paper gives an overview of existing and potential privacy enhancing technologies for the Internet, as well as motivation and challenges for future work in this field.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
COMPCON '97: Proceedings of the 42nd IEEE International Computer Conference
February 1997
ISBN:0818678046

Publisher

IEEE Computer Society

United States

Publication History

Published: 23 February 1997

Author Tags

  1. Internet
  2. future work
  3. personal privacy
  4. privacy enhancing technologies

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2018)Age-based anonymityTelecommunications Systems10.1007/s11235-018-0459-869:2(223-235)Online publication date: 1-Oct-2018
  • (2017)Model for reducing risks to private or sensitive dataProceedings of the 9th International Workshop on Modelling in Software Engineering10.5555/3104068.3104076(19-25)Online publication date: 20-May-2017
  • (2010)In search of search privacyProceedings of the 7th international conference on Trust, privacy and security in digital business10.5555/1894888.1894902(102-116)Online publication date: 30-Aug-2010
  • (2010)Collaborative privacy managementComputers and Security10.1016/j.cose.2009.12.00729:5(580-591)Online publication date: 1-Jul-2010
  • (2009)Proposal, design and evaluation of a mechanism to limit the length of anonymous overlay network pathsComputers and Security10.1016/j.cose.2009.05.00128:8(772-784)Online publication date: 1-Nov-2009
  • (2009)Privacy-aware routing in sensor networksComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2009.02.00253:9(1512-1529)Online publication date: 25-Jun-2009
  • (2009)Privacy in a Semantic CloudProceedings of the 1st International Conference on Cloud Computing10.1007/978-3-642-10665-1_10(107-118)Online publication date: 22-Nov-2009
  • (2008)Personal information and privacy in E-commerce applicationProceedings of the 7th WSEAS international conference on Information security and privacy10.5555/1576645.1576650(28-32)Online publication date: 29-Dec-2008
  • (2007)Authorization architectures for privacy-respecting surveillanceProceedings of the 4th European conference on Public Key Infrastructure: theory and practice10.5555/2394420.2394421(1-17)Online publication date: 28-Jun-2007
  • (2007)The motivation and proposition of a privacy-enhancing architecture for operational databasesProceedings of the fifth Australasian symposium on ACSW frontiers - Volume 6810.5555/1274531.1274552(173-182)Online publication date: 30-Jan-2007
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media